From patchwork Sat Apr 8 20:08:10 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Alexander Alemayhu X-Patchwork-Id: 748667 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 3w0nZQ5FHBz9s7C for ; Sun, 9 Apr 2017 06:08:30 +1000 (AEST) Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=alemayhu-com.20150623.gappssmtp.com header.i=@alemayhu-com.20150623.gappssmtp.com header.b="fbLlWOwT"; dkim-atps=neutral Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752261AbdDHUIV (ORCPT ); Sat, 8 Apr 2017 16:08:21 -0400 Received: from mail-wr0-f179.google.com ([209.85.128.179]:35666 "EHLO mail-wr0-f179.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750997AbdDHUIT (ORCPT ); Sat, 8 Apr 2017 16:08:19 -0400 Received: by mail-wr0-f179.google.com with SMTP id o21so98705956wrb.2 for ; Sat, 08 Apr 2017 13:08:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alemayhu-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id; bh=BAm+EpqpRp/cwCPZS1bVBdtZcrm3mNVByretI1sDsN4=; b=fbLlWOwT2YAwOkCRJ4keASdry2wXGPtPZPCKDcftLwG9yODFwqQhgpvC42i3JY5pzA Sa4Z74/2XLtXqjSii4o+Iux8KQvCmscVuUwTO1mt8qaDfO+qtCcn6CCgul++kBSz7LRa zypoRvyXqP6hDjLeDfvx22UsivkiBahxsU/dRFWYpLeDmj7OltLm8TZKBL4f+Z5PgVzi K5YFylLZSAX3JiFzegjXmXc19Q27Fwcfn/euGz7i70swSJb0M0O2lc8y0Ua0iRH/CSfW BPY0L0PdLmJ0HOV4zGPUp7nC7Vs6Ou+X7Jo6wuBZp2q6HckXdMU6Fy+pp1QSryAhhnxQ EgWw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=BAm+EpqpRp/cwCPZS1bVBdtZcrm3mNVByretI1sDsN4=; b=gcWW1fp93kay2n804P7LMc1RICmrA8nINzvQBAAE4iQuzMl+gy3g8t9t4bCQ0oWZ7b 0qoa3lViElNxTD7yUos3kD55Pw50gic2FpECbOMQHsLcXZSMNnPv6+torm4O1thWEI2E XN5/1L066qf5Tn8SyVRpq6uwjCyzgihAcMjuGcPo5ntfVo7jJTIUr0jQ6PTI8/pPz1mG ygueHPM97ms4iRJjZjKEFmHLQztDYyv0tHF/oobYI+wKaLQRQtJ1/WXaWP/gFEAI9Cyx lFpwpZgIuOST/wOK7HaA/psxwuiFcJhME8+2WEnyVdQHaDJ+qsA4U0herqKrQylfbc0Z jtDQ== X-Gm-Message-State: AN3rC/4lu2VTZkDS8CDHnXo4Ug7cc5IabQKR/OlMQ5vhHYo1R9UKP/0UN62/7vLHPzEopg== X-Received: by 10.223.166.9 with SMTP id k9mr3508113wrc.177.1491682097576; Sat, 08 Apr 2017 13:08:17 -0700 (PDT) Received: from localhost ([2a01:4f8:121:2342::2]) by smtp.gmail.com with ESMTPSA id n13sm3831990wmi.28.2017.04.08.13.08.16 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sat, 08 Apr 2017 13:08:16 -0700 (PDT) From: Alexander Alemayhu To: netdev@vger.kernel.org Cc: daniel@iogearbox.net, ast@fb.com, Alexander Alemayhu Subject: [PATCH net-next] bpf: fix comment typo Date: Sat, 8 Apr 2017 22:08:10 +0200 Message-Id: <1491682090-29824-1-git-send-email-alexander@alemayhu.com> X-Mailer: git-send-email 2.7.4 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org o s/bpf_bpf_get_socket_cookie/bpf_get_socket_cookie Signed-off-by: Alexander Alemayhu Acked-by: Daniel Borkmann --- include/uapi/linux/bpf.h | 2 +- tools/include/uapi/linux/bpf.h | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h index a1d95386f562..1e062bb54eec 100644 --- a/include/uapi/linux/bpf.h +++ b/include/uapi/linux/bpf.h @@ -472,7 +472,7 @@ union bpf_attr { * > 0 length of the string including the trailing NUL on success * < 0 error * - * u64 bpf_bpf_get_socket_cookie(skb) + * u64 bpf_get_socket_cookie(skb) * Get the cookie for the socket stored inside sk_buff. * @skb: pointer to skb * Return: 8 Bytes non-decreasing number on success or 0 if the socket diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h index a1d95386f562..1e062bb54eec 100644 --- a/tools/include/uapi/linux/bpf.h +++ b/tools/include/uapi/linux/bpf.h @@ -472,7 +472,7 @@ union bpf_attr { * > 0 length of the string including the trailing NUL on success * < 0 error * - * u64 bpf_bpf_get_socket_cookie(skb) + * u64 bpf_get_socket_cookie(skb) * Get the cookie for the socket stored inside sk_buff. * @skb: pointer to skb * Return: 8 Bytes non-decreasing number on success or 0 if the socket